{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:26:08Z","timestamp":1729650368409,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/ecai.2015.7301165","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T22:15:02Z","timestamp":1445897702000},"page":"S-79-S-84","source":"Crossref","is-referenced-by-count":5,"title":["A hierarchical decision system for human behavioral recognition"],"prefix":"10.1109","author":[{"given":"Sorin","family":"Soviany","sequence":"first","affiliation":[]},{"given":"Sorin","family":"Puscoci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Biometric Security Model with Identities Detection and Local Feature-level Fusion","author":"soviany","year":"2013","journal-title":"The 2013 International Conference on Security and Management (SAM&#x2018;13) World Academy of Science"},{"article-title":"Pattern Recognition","year":"2009","author":"theodoridis","key":"ref11"},{"article-title":"PerClass Training Course: Machine Learning for R&D Specialists","year":"0","author":"theodoridis","key":"ref12"},{"article-title":"A Comparison of Multi-Class Support Vector Machine Methods for Face Recognition","year":"2007","author":"seo","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/11494683_28","article-title":"Which is the Best Multiclass SVM Method? An Empirical Study","author":"duan","year":"2005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2013.6630784"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"521","DOI":"10.3934\/nhm.2011.6.521","article-title":"Recognition of Crowd Behavior from Mobile Sensors with Pattern Analysis and Graph Clustering Methods","volume":"6","author":"roggen","year":"2011","journal-title":"Networks and Heterogeneous Media American Institute for Mathematical Sciences"},{"key":"ref6","article-title":"Human Activity Recognition on Smartphones using a Multiclass Hardware-Friendly Support Vector Machine","author":"anguita","year":"2012","journal-title":"6th International Conference on Ubiquitous Computing and Ambient Intelligence&4 th International Workshop on Ambient Assisted Living-UCAmI&IWAAL 2012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s130201402"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MeMeA.2014.6860060"},{"key":"ref7","article-title":"An Optimized Iris Recognition System for Multi-level Security Applications","author":"soviany","year":"2014","journal-title":"The 2014 International Conference on Security and Management (SAM&#x2018; 14) World Academy of Science"},{"key":"ref2","article-title":"Learning Driving Behavior by Timed Syntactic Pattern Recognition","author":"verwer","year":"2011","journal-title":"Proceedings of the 22nd International J oint Conference on Artificial Intelligence"},{"key":"ref1","article-title":"Sensor-based Occupancy Behavioral Pattern Recognition for Energy and Comfort Management in Intellingent Buildings","author":"bing","year":"2009","journal-title":"Proc 11th International IBPSA Conference"},{"key":"ref9","article-title":"The Target vs. Non-Target Classification Approach for Biometric Recognition Applications","author":"soviany","year":"2014","journal-title":"18th International Conference on Circuits Systems Communications and Computers (CSCC 2014)"}],"event":{"name":"2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2015,6,25]]},"location":"Bucharest, Romania","end":{"date-parts":[[2015,6,27]]}},"container-title":["2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7297040\/7301133\/07301165.pdf?arnumber=7301165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T22:15:36Z","timestamp":1498256136000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7301165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ecai.2015.7301165","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}